The Income TaX (IT) Department on 30 June 2017 clarified that PAN-Aadhaar linking will become mandatory from 1 July 2017, however, it is not mandatory to link before 1 July.If one is not able to link Aadhaar and PAN before 1 July, then the PAN will not become invalid automatically. Rather, after 1 July 2017,

1. Who among the following scholar declared that ‘Sapt Saidhava’ region was the homeland of Aryans Dr. A C Das Prof. Maxmulle, Prof. Penka Ans:Dr.Ac Das 2.Which of the following was the basic unit of Vedic Society? A. Jana B. Vidath C. Pariva, D. Sangh Ans:C 3. Which of the following was the basic unit

Ramnath Kovind takes oath as 14th President of India Ramnath Kovind on 25 July 2017 took oath as the 14th President of India. He was administered the oath of office by Chief Justice of India Justice JS Khehar at a special function in the Parliament. After swearing-in ceremony of Kovind, he was given 21-gun salute.

The Union Government on 24 July 2017 introduced a mobile app Aarambh for road maintenance. The app was launched by Narendra Singh Tomar, Union Minister for Panchayati Raj, Rural Development, Drinking Water & Sanitation, and Deborah Greenfield, Deputy Director General (Policy) of the International Labour Organization (ILO). In addition, Tomar and Greenfield also launched a

The Unique Identification Authority of India (UIDAI) on 19 July 2017 launched the mAadhaar app for syncing Aadhaar data on the mobile phone, a move that will negate the need to carry the Aadhaar card in wallets. At present, the mAadhaar app is only available on Android phones and can be downloaded on the Google

The National Book Trust (NBT) recently launched the Har Haath Ek Kitaab (One Book for Every Hand) scheme. The scheme allows the people to make donations to children, between the ages of siX and 12, in the form of books with a simple method. Key highlights of the scheme People who wish to donate can

Ransomware is a type of malicious software that infects and restricts access to a computer until a ransom is paid. Although there are other methods of delivery, ransomware is frequently delivered through phishing emails and exploits unpatched vulnerabilities in software. What is the modus operandi? Phishing emails are crafted to appear as though they have

ICAN’T POSSIBLY writethis column about any other subject than ransomware,following the recent attack on the NHS. so I want to talk about how this kind of attack can be prevented or,at the least, the damage mitigated. Malware has long been designed to make its creators money, but ransomware is in many ways the peak evolution